{"title":"Priority inheritance and ceilings for distributed mutual exclusion","authors":"F. Müller","doi":"10.1109/REAL.1999.818861","DOIUrl":"https://doi.org/10.1109/REAL.1999.818861","url":null,"abstract":"The contributions of this paper are threefold. First, a solution to the problem of prioritized mutual exclusion in a distributed system is proved correct. This protocol is based on fewer requirements than prioritized extensions of other protocols and outperforms other protocols with an average complexity of /spl theta/(log n) and a worst-case complexity of O(n) messages for n nodes. Second, the concept of relative fairness is introduced which quantifies the relation between parallel events in terms of their ordering in the absence of synchronized clocks. This concept is applied to the protocol in order to determine a requirement to guarantee a certain order between events when message delays are bounded. Third, the protocol is extended to prevent priority inversion by incorporating the priority inheritance and the priority ceiling protocols. The extensions are shown to integrate well with the original protocol. They impose the same message overhead as mentioned before for each dynamically raised priority due to resource contention while early priority boosting, such as for the priority ceiling emulation protocol, requires no additional overhead at all.","PeriodicalId":160347,"journal":{"name":"Proceedings 20th IEEE Real-Time Systems Symposium (Cat. No.99CB37054)","volume":"65 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115153032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pfair scheduling of fixed and migrating periodic tasks on multiple resources","authors":"Mark Moir, Srikanth Ramamurthy","doi":"10.1109/REAL.1999.818857","DOIUrl":"https://doi.org/10.1109/REAL.1999.818857","url":null,"abstract":"This paper concerns the problem of scheduling sets of preemptable, periodic tasks on multiple resources. We consider a task model that allows arbitrary mixes of fixed and migratable tasks, and prove the existence of an optimal pfair scheduler in this model. Fixed tasks must always be scheduled on a given resource, while migratable tasks can be scheduled on different resources at different times. A pfair scheduler produces a periodic schedule in which the times each task is allocated a processor are approximately evenly spread throughout its period. This paper extends work of Baruah et al., who proved a similar result for systems in which all tasks are migratable.","PeriodicalId":160347,"journal":{"name":"Proceedings 20th IEEE Real-Time Systems Symposium (Cat. No.99CB37054)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129657296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of the impacts of overestimation sources on the accuracy of worst case timing analysis","authors":"Sung-Kwan Kim, S. Min, Rhan Ha","doi":"10.1109/REAL.1999.818825","DOIUrl":"https://doi.org/10.1109/REAL.1999.818825","url":null,"abstract":"To predict the worst case execution time (WCET) of real-time tasks, we should consider various factors (e.g., caching, pipelining, and infeasible paths) that affect the accuracy of the prediction. However some of them are inherently difficult to analyze statically, and thus may give rise to significant overestimation in WCET prediction. Therefore, for more accurate WCET prediction, we need to identify, such overestimation sources and analyze how much each of them can make overestimation. Then, such analysis results can be used to refine existing timing analysis techniques. In this paper we do not propose any new timing analysis techniques, but present quantitative analysis results on the impacts of overestimation sources on the accuracy of the worst case timing analysis. For this purpose, we use variance analysis based on a simulation-based methodology to make our analysis independent of any existing techniques. The results show that the dominant factor is pipelining analysis when the cache miss penalty is small and instruction caching analysis when the cache miss penalty is larger than 10 cycles. The results also show that although the impact of data caching analysis is small compared with that of pipelining or instruction caching analysis, if we ignore its effect in the WCET estimation, the WCET can be overestimated up to 275% even when the effects of the other factors are completely analyzed. Finally, the results show that the effects of infeasible paths are largely orthogonal to other analysis features and depend on program characteristics. Also, as for data caching, if infeasible paths are ignored in the WCET estimation, the accuracy of the WCET estimation is degraded significantly (up to 564%).","PeriodicalId":160347,"journal":{"name":"Proceedings 20th IEEE Real-Time Systems Symposium (Cat. No.99CB37054)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122984559","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enabling deadline scheduling for Java real-time computing","authors":"C. Lizzi","doi":"10.1109/REAL.1999.818837","DOIUrl":"https://doi.org/10.1109/REAL.1999.818837","url":null,"abstract":"We present a scheduling architecture that enables the implementation of deadline based scheduling policies. The architecture is used to give real time capabilities to a custom Java virtual machine. This framework retains a clear separation between generic kernel mechanisms and upper level scheduling classes. A pure earliest deadline first algorithm can be implemented, but enhanced policies such as D/sup over/ or Robust EDF are also supported. We present our architecture, its implementation in the ChorusOS microkernel and its use by the Java virtual machine.","PeriodicalId":160347,"journal":{"name":"Proceedings 20th IEEE Real-Time Systems Symposium (Cat. No.99CB37054)","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126383945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New results on fixed priority aperiodic servers","authors":"G. Bernat, A. Burns","doi":"10.1109/REAL.1999.818829","DOIUrl":"https://doi.org/10.1109/REAL.1999.818829","url":null,"abstract":"The issue of using the sporadic server (SS) for scheduling aperiodic tasks has received new attention under the POSIX standard as it has been proposed in P1003.1 d, the additional real-time extensions to POSIX. The SS has been traditionally considered a better approach to the deferrable server (DS) due to its supposed higher achievable utilisation. However, SS also has higher implementation complexity. Nevertheless, the analysis of the comparisons performed from several authors between DS and SS is not conclusive. A review on fixed priority servers is presented with a new parameter selection technique and comprehensive performance analysis based on simulation techniques. With this parameter selection, it is shown that no server performs significantly better than the other in most of the situations. This suggests that future POSIX revisions for real-time support should also consider mechanisms by which other types of servers could be implemented.","PeriodicalId":160347,"journal":{"name":"Proceedings 20th IEEE Real-Time Systems Symposium (Cat. No.99CB37054)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127164942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A framework for provisioning of temporal QoS in core-based multicast routing","authors":"Hung-Ying Tyan, J. Hou, Bin Wang","doi":"10.1109/REAL.1999.818840","DOIUrl":"https://doi.org/10.1109/REAL.1999.818840","url":null,"abstract":"We develop and evaluate a set of member join/leave and state update/refresh procedures for QoS provisioning in core-based multicast routing with explicit member join and soft state refresh procedures. Specifically, in our prior work (Hung-Ying Tyan et al., 1999), we devised eligibility tests to verify whether or not a new member can join a multicast tree at adequate QoS while not violating the existing QoS guarantees to other on-tree members. We extend our prior work, identify the tradeoff between the amount of state kept at each on-tree router and the degree of collaboration among on-tree routers to conduct the tests, and develop two member join/leave procedures that range from using the most comprehensive state update procedure (and hence the least degree of collaboration among on-tree routers) to the other extreme. Also, we evaluate the proposed framework, in terms of the probability of locating feasible multicast trees, message overheads, and scalability.","PeriodicalId":160347,"journal":{"name":"Proceedings 20th IEEE Real-Time Systems Symposium (Cat. No.99CB37054)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132913689","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hakan Aydin, R. Melhem, D. Mossé, Pedro Mejía-Alvarez
{"title":"Optimal reward-based scheduling of periodic real-time tasks","authors":"Hakan Aydin, R. Melhem, D. Mossé, Pedro Mejía-Alvarez","doi":"10.1109/REAL.1999.818830","DOIUrl":"https://doi.org/10.1109/REAL.1999.818830","url":null,"abstract":"Reward-based scheduling refers to the problem in which there is a reward associated with the execution of a task. In our framework, each real-time task comprises a mandatory and an optional part, with which a nondecreasing reward function is associated. Imprecise Computation and Increased-Reward-with-Increased-Service models fall within the scope of this framework. In this paper we address the reward-based scheduling problem for periodic tasks. For linear and concave reward functions we show: (a) the existence of an optimal schedule where the optional service time of a task is constant at every instance and (b) how to efficiently compute this service time. We also prove that RMS-h (RMS with harmonic periods), EDF and LLF policies are optimal when used with the optimal service times we computed, and that the problem becomes NP-Hard, when the reward functions are convex. Further, our solution eliminates run-time overhead, and makes possible the use of existing scheduling disciplines.","PeriodicalId":160347,"journal":{"name":"Proceedings 20th IEEE Real-Time Systems Symposium (Cat. No.99CB37054)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116613951","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"FARACost: an adaptation cost model aware of pending constraints","authors":"D. Rosu, K. Schwan","doi":"10.1109/REAL.1999.818848","DOIUrl":"https://doi.org/10.1109/REAL.1999.818848","url":null,"abstract":"The perturbations induced by adaptation and resource allocation decisions on the adapted applications may have the undesirable side effect of causing timing constraint failures. In order to benefit from available adaptation capabilities yet avoid critical timing failures, the dynamic resource allocation mechanism should be aware of the perturbation induced by its decisions. Therefore, the impact of adaptation on short-term performance should be considered a first-class decision criterion, along with traditional criteria such as long-term performance and application criticality. Towards this end, we propose the FARACost, an adaptation cost model that captures the impact of application-specific adaptation procedures and uses this information to evaluate adaptation choices. Experimental evaluations with two applications demonstrate that the use of models like FARACost reduces or prevents pending timing constraint failures, while leading to long-term performance improvements. The experiments are conducted in a cluster environment with a fully implemented infrastructure for adaptation and resource allocation based on the FARA framework.","PeriodicalId":160347,"journal":{"name":"Proceedings 20th IEEE Real-Time Systems Symposium (Cat. No.99CB37054)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134354039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"High-level modeling and analysis of TCAS","authors":"Carolos Livadas, J. Lygeros, N. Lynch","doi":"10.1109/REAL.1999.818833","DOIUrl":"https://doi.org/10.1109/REAL.1999.818833","url":null,"abstract":"In this paper we demonstrate a high-level approach to modeling and analyzing complex safety-critical systems through a case study in the area of air traffic management. In particular, we focus our attention on the Traffic Alert and Collision Avoidance System (TCAS); an on-board conflict detection and resolution system which alerts pilots to the presence of nearby aircraft that pose a mid-air collision threat and issues conflict resolution advisories. Due to the complexity of the TCAS software and the hybrid nature of the closed-loop system, the traditional testing techniques through simulation do not constitute a viable verification approach. To aid people in analyzing and designing such systems, we advocate defining high-level mathematical system models that capture the behavior not only of the software, but also of the airplanes, sensors, and pilots-that is, high-level hybrid system models. In particular we show how the core components of this complex system can be captured by relatively simple Hybrid I/O Automata (HIOA) which are amenable to formal analysis. We then outline a methodology for establishing conditions under which the conflict resolution advisories issued by TCAS guarantee sufficient separation in altitude for aircraft involved in mid-air collision threats. Although our results are intended only as illustrations of high-level modeling and analysis techniques, the TCAS system models provide a foundation for study of a wide range of properties of the system's behavior.","PeriodicalId":160347,"journal":{"name":"Proceedings 20th IEEE Real-Time Systems Symposium (Cat. No.99CB37054)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132958191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient delay computation methods for an ATM network with real-time video traffic","authors":"Shibin Song, J. Ng, B. Tang","doi":"10.1109/REAL.1999.818842","DOIUrl":"https://doi.org/10.1109/REAL.1999.818842","url":null,"abstract":"Consider a real time communication application running on top of an ATM network; we require the connection to provide a transmission guarantee for the real time service. Such transmission guarantee can only be possible if there exists an absolute and deterministic worst case delay bound on all the ATM cells within the real time connection. We present our approach in finding this worst case cell delay within an ATM switch. In terms of computation complexity, we find out that our proposed method is no harder than any other existing methods in finding such worse case delay. Furthermore, while other researchers tackle different schedulers with different approaches, our method is general enough and is applicable to schedulers that adopt the FIFO, Static Priority (SP), Earliest Deadline First (EDF) and Generalized Processor Sharing (GPS) scheduling policies. In addition, in our proposed \"Fixed Points\" method, we trade off accuracy with computation complexity for performance. As a result, our improved method is shown to be superior to all existing methods in terms of computation complexity. Through our simulation experiments based on real time MPEG video streams, the loss in accuracy for estimating the worst case cell delay is shown to be negligible for the connection admission control for an ATM network.","PeriodicalId":160347,"journal":{"name":"Proceedings 20th IEEE Real-Time Systems Symposium (Cat. No.99CB37054)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1999-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123603222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}